Książki na temat „User Access Control”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych książek naukowych na temat „User Access Control”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj książki z różnych dziedzin i twórz odpowiednie bibliografie.
Corporation, Quarterdeck. Procomm RapidRemote: User guide. Quarterdeck, 1996.
Znajdź pełny tekst źródłaJasper, Kim. User access & information protection: Managing open access & information protection. PROJECT CONSULT, 2002.
Znajdź pełny tekst źródłaHelme, Arne. A system for secure user-controlled electronic transactions. Shaker Publishing, 1997.
Znajdź pełny tekst źródłaTodorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.
Znajdź pełny tekst źródłaRodrigues, Charmaine. Karnataka Right to Information Act, 2000: A user guide. Edited by Muralidharan Y. G, Daruwala Maja, Nayak Venkatesh, Commonwealth Human Rights Initiative, Consumer Rights Education & Awareness Trust (Bangalore, India), and Karnataka (India). Commonwealth Human Rights Initiative, 2005.
Znajdź pełny tekst źródłaParker, Philip M. The 2009-2014 world outlook for user account provisioning technologies. Icon Group International, 2008.
Znajdź pełny tekst źródłaConference, Uniwersytet Jagielloński Instytut Bibliotekoznawstwa i. Informacji Naukowej International. Użytkownicy informacji elektronicznej. Wydawn. Uniwersytetu Jagiellońskiego, 2000.
Znajdź pełny tekst źródłaUnited States. Congress. House. Committee on Ways and Means. Subcommittee on Trade and United States. Congress. Senate. Committee on Finance, eds. Customs service: Passenger user fee collection needs to be reevaluated : report to the Committee on Finance, U.S. Senate, and Subcommittee on Trade, Committee on Ways and Means, House of Representatives. The Office, 1995.
Znajdź pełny tekst źródłaHeld, Gilbert. Netware login scripts: The productivity tool for administrators and users. McGraw-Hill, 1996.
Znajdź pełny tekst źródłaJohnson, Maritza Lupe. Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings. [publisher not identified], 2012.
Znajdź pełny tekst źródłaGruchoła, Małgorzata. Ochrona użytkowników internetu w państwach Unii Europejskiej. Wydawn. KUL, 2012.
Znajdź pełny tekst źródłaUnited States. Veterans Administration. Office of Data Management and Telecommunications. Computer security: A handbook for VA managers and end-users. Veterans Administration, Office of Data Management and Telecommunications, 1986.
Znajdź pełny tekst źródłaIan, McDonald. Technology, contracts & paracopyright: A discussion paper. Australian Copyright Council, 2007.
Znajdź pełny tekst źródłaWisconsin. Dept. of Public Instruction., ed. Dealing with selection and censorship: A handbook for Wisconsin schools and libraries. Wisconsin Dept. of Public Instruction, 1999.
Znajdź pełny tekst źródłaRibot, Jesse Craig. From exclusion to participation: A history of forest access control in eastern Senegal. African Studies Center, Boston University, 1994.
Znajdź pełny tekst źródłaUnited States. Bureau of Justice Statistics., ed. Public attitudes toward uses of criminal history information: A privacy, technology, and criminal justice information report. U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Statistics, 2000.
Znajdź pełny tekst źródłaMarcilloux, Patrice. A l'écoute des publics des archives: Identités, attentes, réponses : actes de la journée d'étude du 9 mars 2007. Presses de l'université d'Angers, 2009.
Znajdź pełny tekst źródłaUnited States. General Accounting Office. and United States. Congress. Senate. Committee on Health, Education, Labor, and Pensions., eds. Medical records privacy: Uses and oversight of patient information in research : statement of Bernice Steinhardt, Director, Health Services Quality and Public Health Issues, Health, Education, and Human Services Division, before the Committee on Health, Education, Labor and Pensions, U.S. Senate. The Office, 1999.
Znajdź pełny tekst źródłaInternational Federation of Library Associations and Institutions. and Rossiĭskai︠a︡ bibliotechnai︠a︡ assot︠s︡iat︠s︡ii︠a︡, eds. Rukovodstvo IFLA/I︠U︡NESKO po Manifestu IFLA ob Internete. Rossiĭskai︠a︡ nat︠s︡ionalʹnai︠a︡ biblioteka, 2007.
Znajdź pełny tekst źródłaInternational Federation of Library Associations and Institutions. and Rossiĭskai︠a︡ bibliotechnai︠a︡ assot︠s︡iat︠s︡ii︠a︡, eds. Rukovodstvo IFLA/I︠U︡NESKO po Manifestu IFLA ob Internete. Rossiĭskai︠a︡ nat︠s︡ionalʹnai︠a︡ biblioteka, 2007.
Znajdź pełny tekst źródłaUnited States. Congress. House. Committee on Energy and Commerce. Subcommittee on Telecommunications and the Internet. E-rate and filtering: A review of the Children's Internet Protection Act : hearing before the Subcommittee on Telecommunications and the Internet of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, April 4, 2001. U.S. G.P.O., 2001.
Znajdź pełny tekst źródłaBurt, David. Dangerous access: Uncovering Internet pornography in America's libraries. 2nd ed. Family Research Council, 2000.
Znajdź pełny tekst źródłaNational Conference on Juvenile Justice Records: Appropriate Criminal and Noncriminal Justice Uses (1996 Washington, D.C.). National Conference on Juvenile Justice Records--Appropriate Criminal and Noncriminal Justice Uses: Proceedings of a BJS/SEARCH conference. U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Statistics, 1997.
Znajdź pełny tekst źródłaVirginia. General Assembly. Joint Subcommittee Studying State and Federal Law on Privacy, Confidentiality, and Mandatory Disclosure of Information Held or Used by Governmental Agencies. Report of the Joint Subcommittee Studying State and Federal Law on Privacy, Confidentiality and Mandatory Disclosure of Information Held or Used by Governmental Agencies to the Governor and General Assembly of Virginia. Commonwealth of Virginia, 1996.
Znajdź pełny tekst źródłaEhud, Gudes, Jensen Christian Damsgaard, Crampton Jason, and SpringerLink (Online service), eds. Trust Management V: 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29 – July 1, 2011. Proceedings. IFIP International Federation for Information Processing, 2011.
Znajdź pełny tekst źródłaKim, Chun-gyo. Int'ŏnet pulpŏp, yuhae chŏngbo silt'ae mit taeŭng pangan yŏn'gu. Pangsong T'ongsin Simŭi Wiwŏnhoe, 2012.
Znajdź pełny tekst źródłaDuncan, Beatrice Akua. Access to and control over land from a gender perspective: A study conducted in the Volta Region of Ghana. Food and Agriculture Organization of the United Nations, Regional Office for Africa, 2004.
Znajdź pełny tekst źródłaBoĭkova, O. F. Personalʹnye dannye: Obrabotka, ispolʹzovanie i zashchita : metodicheskie rekomendat︠s︡ii. Pashkov dom, 2012.
Znajdź pełny tekst źródłaQld.) Legal Framework for E-Research International Congress (2007 Gold Coast. Legal framework for e-Research: Realizing the potential. Sydney University Press, 2008.
Znajdź pełny tekst źródłaGureev, Vadim, and Nikolay Mazov. Information resources and tools in the researcher's work. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1989238.
Pełny tekst źródłaKuznecov, Sergey, and Konstantin Rogozin. All of physics on your palm. Interactive reference. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/501810.
Pełny tekst źródłaOffice, General Accounting. VA health care: Access for Chattanooga-area veterans needs improvement : report to congressional requesters. U.S. General Accounting Office, 2004.
Znajdź pełny tekst źródłaSudo Mastery: User Access Control for Real People. Tilted Windmill Press, 2014.
Znajdź pełny tekst źródłaTodorov, Dobromir. Mechanics of User Identification and Authentication: Fundamentals of Identity Management. Auerbach Publishers, Incorporated, 2007.
Znajdź pełny tekst źródłaSeffah, Ahmed, Christina Braz, and Bilal Naqvi. Integrating a Usable Security Protocol into User Authentication Services Design Process. Auerbach Publishers, Incorporated, 2018.
Znajdź pełny tekst źródłaSeffah, Ahmed, Christina Braz, and Bilal Naqvi. Integrating a Usable Security Protocol into User Authentication Services Design Process. Auerbach Publishers, Incorporated, 2018.
Znajdź pełny tekst źródłaMechanics of User Identification and Authentication. Taylor and Francis, 2007.
Znajdź pełny tekst źródłaSeffah, Ahmed, Christina Braz, and Bilal Naqvi. Integrating a Usable Security Protocol into User Authentication Services Design Process. Taylor & Francis Group, 2020.
Znajdź pełny tekst źródłaSeffah, Ahmed, Christina Braz, and Bilal Naqvi. Integrating a Usable Security Protocol into User Authentication Services Design Process. Auerbach Publishers, Incorporated, 2018.
Znajdź pełny tekst źródłaSeffah, Ahmed, Christina Braz, and Bilal Naqvi. Integrating a Usable Security Protocol into User Authentication Services Design Process. Auerbach Publishers, Incorporated, 2018.
Znajdź pełny tekst źródłaIntegrating a Usable Security Protocol into User Authentication Services Design Process. Taylor & Francis Group, 2018.
Znajdź pełny tekst źródłaTodorov, Dobromir. Mechanics of User Identification and Authentication: Fundamentals of Identity Management. Auerbach Publishers, Incorporated, 2007.
Znajdź pełny tekst źródłaTodorov, Dobromir. Mechanics of User Identification and Authentication: Fundamentals of Identity Management. AUERBACH, 2007.
Znajdź pełny tekst źródłaMechanics of user identification and authentication: Fundamentals of identity management. Auerbach Pub, 2007.
Znajdź pełny tekst źródłaTransparent user authentication: Biometrics, RFID and behavioural profiling. Springer, 2011.
Znajdź pełny tekst źródłaClarke, Nathan. Transparent User Authentication: Biometrics, RFID and Behavioural Profiling. Springer London, Limited, 2014.
Znajdź pełny tekst źródłaSnyder, Wesley E., Cliff Wang, and Benjamin S. Riggan. Fundamentals of Sketch-Based Passwords: A General Framework. Springer, 2015.
Znajdź pełny tekst źródłaReidsma, Matthew. Customizing Vendor Systems for Better User Experiences. ABC-CLIO, LLC, 2016. http://dx.doi.org/10.5040/9798400636387.
Pełny tekst źródłaLippmann, Morton, and Richard B. Schlesinger. Risk Management. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780190688622.003.0010.
Pełny tekst źródła